297 lines
4.3 KiB
HTML
297 lines
4.3 KiB
HTML
<HTML
|
|
><HEAD
|
|
><TITLE
|
|
>Background</TITLE
|
|
><META
|
|
NAME="GENERATOR"
|
|
CONTENT="Modular DocBook HTML Stylesheet Version 1.7"><LINK
|
|
REL="HOME"
|
|
TITLE="Secure Programming for Linux and Unix HOWTO"
|
|
HREF="index.html"><LINK
|
|
REL="PREVIOUS"
|
|
TITLE="Introduction"
|
|
HREF="introduction.html"><LINK
|
|
REL="NEXT"
|
|
TITLE="History of Unix, Linux, and Open Source / Free Software"
|
|
HREF="history.html"></HEAD
|
|
><BODY
|
|
CLASS="CHAPTER"
|
|
BGCOLOR="#FFFFFF"
|
|
TEXT="#000000"
|
|
LINK="#0000FF"
|
|
VLINK="#840084"
|
|
ALINK="#0000FF"
|
|
><DIV
|
|
CLASS="NAVHEADER"
|
|
><TABLE
|
|
SUMMARY="Header navigation table"
|
|
WIDTH="100%"
|
|
BORDER="0"
|
|
CELLPADDING="0"
|
|
CELLSPACING="0"
|
|
><TR
|
|
><TH
|
|
COLSPAN="3"
|
|
ALIGN="center"
|
|
>Secure Programming for Linux and Unix HOWTO</TH
|
|
></TR
|
|
><TR
|
|
><TD
|
|
WIDTH="10%"
|
|
ALIGN="left"
|
|
VALIGN="bottom"
|
|
><A
|
|
HREF="introduction.html"
|
|
ACCESSKEY="P"
|
|
>Prev</A
|
|
></TD
|
|
><TD
|
|
WIDTH="80%"
|
|
ALIGN="center"
|
|
VALIGN="bottom"
|
|
></TD
|
|
><TD
|
|
WIDTH="10%"
|
|
ALIGN="right"
|
|
VALIGN="bottom"
|
|
><A
|
|
HREF="history.html"
|
|
ACCESSKEY="N"
|
|
>Next</A
|
|
></TD
|
|
></TR
|
|
></TABLE
|
|
><HR
|
|
ALIGN="LEFT"
|
|
WIDTH="100%"></DIV
|
|
><DIV
|
|
CLASS="CHAPTER"
|
|
><H1
|
|
><A
|
|
NAME="BACKGROUND"
|
|
></A
|
|
>Chapter 2. Background</H1
|
|
><TABLE
|
|
BORDER="0"
|
|
WIDTH="100%"
|
|
CELLSPACING="0"
|
|
CELLPADDING="0"
|
|
CLASS="EPIGRAPH"
|
|
><TR
|
|
><TD
|
|
WIDTH="45%"
|
|
> </TD
|
|
><TD
|
|
WIDTH="45%"
|
|
ALIGN="LEFT"
|
|
VALIGN="TOP"
|
|
><I
|
|
><P
|
|
><I
|
|
>I issued an order and a search was made, and it was found that this
|
|
city has a long history of revolt against kings and has been
|
|
a place of rebellion and sedition.</I
|
|
></P
|
|
></I
|
|
></TD
|
|
></TR
|
|
><TR
|
|
><TD
|
|
WIDTH="45%"
|
|
> </TD
|
|
><TD
|
|
WIDTH="45%"
|
|
ALIGN="RIGHT"
|
|
VALIGN="TOP"
|
|
><I
|
|
><SPAN
|
|
CLASS="ATTRIBUTION"
|
|
>Ezra 4:19 (NIV)</SPAN
|
|
></I
|
|
></TD
|
|
></TR
|
|
></TABLE
|
|
><DIV
|
|
CLASS="TOC"
|
|
><DL
|
|
><DT
|
|
><B
|
|
>Table of Contents</B
|
|
></DT
|
|
><DT
|
|
>2.1. <A
|
|
HREF="history.html"
|
|
>History of Unix, Linux, and Open Source / Free Software</A
|
|
></DT
|
|
><DD
|
|
><DL
|
|
><DT
|
|
>2.1.1. <A
|
|
HREF="history.html#UNIX-HISTORY"
|
|
>Unix</A
|
|
></DT
|
|
><DT
|
|
>2.1.2. <A
|
|
HREF="history.html#FSF-HISTORY"
|
|
>Free Software Foundation</A
|
|
></DT
|
|
><DT
|
|
>2.1.3. <A
|
|
HREF="history.html#LINUX-HISTORY"
|
|
>Linux</A
|
|
></DT
|
|
><DT
|
|
>2.1.4. <A
|
|
HREF="history.html#OSS-HISTORY"
|
|
>Open Source / Free Software</A
|
|
></DT
|
|
><DT
|
|
>2.1.5. <A
|
|
HREF="history.html#LINUX-VS-UNIX"
|
|
>Comparing Linux and Unix</A
|
|
></DT
|
|
></DL
|
|
></DD
|
|
><DT
|
|
>2.2. <A
|
|
HREF="security-principles.html"
|
|
>Security Principles</A
|
|
></DT
|
|
><DT
|
|
>2.3. <A
|
|
HREF="why-write-insecure.html"
|
|
>Why do Programmers Write Insecure Code?</A
|
|
></DT
|
|
><DT
|
|
>2.4. <A
|
|
HREF="open-source-security.html"
|
|
>Is Open Source Good for Security?</A
|
|
></DT
|
|
><DD
|
|
><DL
|
|
><DT
|
|
>2.4.1. <A
|
|
HREF="open-source-security.html#OPEN-SOURCE-SECURITY-EXPERTS"
|
|
>View of Various Experts</A
|
|
></DT
|
|
><DT
|
|
>2.4.2. <A
|
|
HREF="open-source-security.html#OPEN-SOURCE-SECURITY-NOHALT"
|
|
>Why Closing the Source Doesn't Halt Attacks</A
|
|
></DT
|
|
><DT
|
|
>2.4.3. <A
|
|
HREF="open-source-security.html#OPEN-SOURCE-SECURITY-SECRETS"
|
|
>Why Keeping Vulnerabilities Secret Doesn't Make Them Go Away</A
|
|
></DT
|
|
><DT
|
|
>2.4.4. <A
|
|
HREF="open-source-security.html#OPEN-SOURCE-SECURITY-TROJANS"
|
|
>How OSS/FS Counters Trojan Horses</A
|
|
></DT
|
|
><DT
|
|
>2.4.5. <A
|
|
HREF="open-source-security.html#OPEN-SOURCE-SECURITY-OTHER"
|
|
>Other Advantages</A
|
|
></DT
|
|
><DT
|
|
>2.4.6. <A
|
|
HREF="open-source-security.html#OPEN-SOURCE-SECURITY-BOTTOM-LINE"
|
|
>Bottom Line</A
|
|
></DT
|
|
></DL
|
|
></DD
|
|
><DT
|
|
>2.5. <A
|
|
HREF="types-of-programs.html"
|
|
>Types of Secure Programs</A
|
|
></DT
|
|
><DT
|
|
>2.6. <A
|
|
HREF="paranoia.html"
|
|
>Paranoia is a Virtue</A
|
|
></DT
|
|
><DT
|
|
>2.7. <A
|
|
HREF="why-write.html"
|
|
>Why Did I Write This Document?</A
|
|
></DT
|
|
><DT
|
|
>2.8. <A
|
|
HREF="sources-of-guidelines.html"
|
|
>Sources of Design and Implementation Guidelines</A
|
|
></DT
|
|
><DT
|
|
>2.9. <A
|
|
HREF="other-sources.html"
|
|
>Other Sources of Security Information</A
|
|
></DT
|
|
><DT
|
|
>2.10. <A
|
|
HREF="conventions.html"
|
|
>Document Conventions</A
|
|
></DT
|
|
></DL
|
|
></DIV
|
|
></DIV
|
|
><DIV
|
|
CLASS="NAVFOOTER"
|
|
><HR
|
|
ALIGN="LEFT"
|
|
WIDTH="100%"><TABLE
|
|
SUMMARY="Footer navigation table"
|
|
WIDTH="100%"
|
|
BORDER="0"
|
|
CELLPADDING="0"
|
|
CELLSPACING="0"
|
|
><TR
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="left"
|
|
VALIGN="top"
|
|
><A
|
|
HREF="introduction.html"
|
|
ACCESSKEY="P"
|
|
>Prev</A
|
|
></TD
|
|
><TD
|
|
WIDTH="34%"
|
|
ALIGN="center"
|
|
VALIGN="top"
|
|
><A
|
|
HREF="index.html"
|
|
ACCESSKEY="H"
|
|
>Home</A
|
|
></TD
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="right"
|
|
VALIGN="top"
|
|
><A
|
|
HREF="history.html"
|
|
ACCESSKEY="N"
|
|
>Next</A
|
|
></TD
|
|
></TR
|
|
><TR
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="left"
|
|
VALIGN="top"
|
|
>Introduction</TD
|
|
><TD
|
|
WIDTH="34%"
|
|
ALIGN="center"
|
|
VALIGN="top"
|
|
> </TD
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="right"
|
|
VALIGN="top"
|
|
>History of Unix, Linux, and Open Source / Free Software</TD
|
|
></TR
|
|
></TABLE
|
|
></DIV
|
|
></BODY
|
|
></HTML
|
|
> |